Skip to content

Commit a3bf55d

Browse files
committed
remove sdk unittest
1 parent 3e70728 commit a3bf55d

1 file changed

Lines changed: 0 additions & 56 deletions

File tree

src/azure-cli/azure/cli/command_modules/vm/tests/latest/test_custom_vm_commands.py

Lines changed: 0 additions & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -199,62 +199,6 @@ def test_show_vmss_instance_view(self, factory_mock):
199199
resource_group_name='rg1', virtual_machine_scale_set_name='vmss1',
200200
select='instanceView', expand='instanceView')
201201

202-
# pylint: disable=line-too-long
203-
@mock.patch('azure.cli.command_modules.vm.disk_encryption._compute_client_factory', autospec=True)
204-
@mock.patch('azure.cli.command_modules.vm.disk_encryption._get_keyvault_key_url', autospec=True)
205-
def test_enable_encryption_error_cases_handling(self, mock_get_keyvault_key_url, mock_compute_client_factory):
206-
faked_keyvault = '/subscriptions/01234567-1bf0-4dda-aec3-cb9272f09590/resourceGroups/rg1/providers/Microsoft.KeyVault/vaults/v1'
207-
os_disk = OSDisk(create_option=None, os_type=OperatingSystemTypes.linux)
208-
existing_disk = DataDisk(lun=1, vhd='https://someuri', name='d1', create_option=DiskCreateOptionTypes.empty)
209-
vm = FakedVM(None, [existing_disk], os_disk=os_disk)
210-
cmd = _get_test_cmd()
211-
212-
compute_client_mock = mock.MagicMock()
213-
compute_client_mock.virtual_machines.get.return_value = vm
214-
mock_compute_client_factory.return_value = compute_client_mock
215-
216-
mock_get_keyvault_key_url.return_value = 'https://somevaults.vault.azure.net/'
217-
218-
# throw when VM has disks, but no --volume-type is specified
219-
with self.assertRaises(CLIError) as context:
220-
encrypt_vm(cmd, 'rg1', 'vm1', 'client_id', faked_keyvault, 'client_secret')
221-
222-
self.assertTrue("supply --volume-type" in str(context.exception))
223-
224-
# throw when no AAD client secrets
225-
with self.assertRaises(CLIError) as context:
226-
encrypt_vm(cmd, 'rg1', 'vm1', 'client_id', faked_keyvault)
227-
228-
self.assertTrue("--aad-client-cert-thumbprint or --aad-client-secret" in str(context.exception))
229-
230-
@mock.patch('azure.cli.command_modules.vm.disk_encryption.set_vm', autospec=True)
231-
@mock.patch('azure.cli.command_modules.vm.disk_encryption._compute_client_factory', autospec=True)
232-
def test_disable_encryption_error_cases_handling(self, mock_compute_client_factory, mock_vm_set): # pylint: disable=unused-argument
233-
os_disk = OSDisk(create_option=None, os_type=OperatingSystemTypes.linux)
234-
existing_disk = DataDisk(lun=1, vhd='https://someuri', name='d1', create_option=DiskCreateOptionTypes.empty)
235-
vm = FakedVM(None, [existing_disk], os_disk=os_disk)
236-
cmd = _get_test_cmd()
237-
vm_extension = VirtualMachineExtension(location='westus',
238-
settings={'SequenceVersion': 1},
239-
instance_view=VirtualMachineExtensionInstanceView(
240-
statuses=[InstanceViewStatus(message='Encryption completed successfully')],
241-
substatuses=[InstanceViewStatus(message='{"os":"Encrypted"}')]))
242-
vm_extension.provisioning_state = 'Succeeded'
243-
compute_client_mock = mock.MagicMock()
244-
compute_client_mock.virtual_machines.get.return_value = vm
245-
compute_client_mock.virtual_machine_extensions.get.return_value = vm_extension
246-
mock_compute_client_factory.return_value = compute_client_mock
247-
248-
# throw on disabling encryption on OS disk of a linux VM
249-
with self.assertRaises(CLIError):
250-
decrypt_vm(cmd, 'rg1', 'vm1', 'OS')
251-
252-
# self.assertTrue("Only Data disks can have encryption disabled in a Linux VM." in str(context.exception))
253-
254-
# works fine to disable encryption on daat disk when OS disk is never encrypted
255-
vm_extension.instance_view.substatuses[0].message = '{}'
256-
decrypt_vm(cmd, 'rg1', 'vm1', 'DATA')
257-
258202
def test_merge_secrets(self):
259203
secret1 = [{
260204
'sourceVault': {'id': '123'},

0 commit comments

Comments
 (0)